Captive Portal Configuration Guide - Meraki
Transcription
Captive Portal Configuration Guide - Meraki
White Paper Captive Portal Configuration Guide June 2014 This document describes the protocol flow, configuration process and example use-cases for self-hosted captive portal (splash page) access, which is relevant for Wi-Fi hotspot provision by retailers, hospitality owners and service providers. Table of Contents 1 What is a Captive Portal? 3 2 Using Meraki’s Built-in Splash Tools4 3 Configuring an External Captive Portal (EXCAP) 6 A. EXCAP Overview - Click-Through Splash B. EXCAP Overview - Sign-on Splash 4 Example Implementations 14 A. Customers B. Service Providers C. Advanced EXCAP Use-Cases 5 Conclusion 18 Copyright © 2014 Cisco Systems, Inc. All rights reserved Trademarks Meraki® is a registered trademark of Cisco Systems, Inc. 2 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] 1 What is a Captive Portal? A captive portal (also known as a ‘“splash page”) is what a user sees when they first associate with a Wi-Fi SSID and open a web browser to surf the Internet. When a captive portal is configured, all Internet traffic will be re-directed to a particular URL and a user is required to take specific actions before their traffic is able to pass through to the Internet. In this fashion, a service provider controls the initial Internet experience for their end customer can request the customer take a variety of actions such as: (1) fill out a survey, (2) purchase a billing plan, (3) view an advertisement, or (4) accept a set of terms and conditions before being allowed onto the Internet. A captive portal facilitates direct audience engagement at a critical point during a user’s Internet experience, and is therefore a powerful medium that can be used for a flexible range of use cases. Figure 1. Example captive portal page Cisco Meraki’s cloud management platform includes built-in captive portal functionality with features like credit card billing, prepaid codes, and pre-built templates for free click-through access. In addition, the Meraki solution also provides a powerful external captive portal API known as EXCAP, which can allow customers and partners to deploy and leverage their own captive portal and billing systems, enabling a limitless range of applications such as specialized coupons and user analytics. More information on deploying and configuring these capabilities is described in the subsequent chapters. 3 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] 2 Using Built-in Splash Tools The Meraki dashboard cloud management platform has a number of built-in captive portal tools that can be used to get a powerful splash page up and running within minutes. This platform includes some of the following features: Splash page setup • Custom messaging/terms of access • Custom logo/branding • Customizing specific elements on the splash page Figure 2. Meraki cloud-hosted custom splash editing tool 4 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] Splash page authentication • Click-through sign-on • New user-sign up with guest ambassador authorization • Username/password sign-on with Meraki RADIUS • Username/password sign-on with own RADIUS/LDAP server (see Meraki whitepaper “Active Directory Integration”) • Facebook sign-on Splash page billing options • Free tiered access • Setting up credit card billing plans • Using prepaid codes generated by Meraki Information on the Meraki built-in splash and captive portal capabilities, as well as instructions on how these settings can be configured, are available within Meraki online documentation at https://docs.meraki.com/display/MR/splash+pages. 5 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] 3 Configuring an External Captive Portal (EXCAP) This section explains how an administrator can use the Meraki external captive portal (EXCAP) API to configure a splash page that is hosted on their own server. This includes an overview of the two major captive portal sign-on methodologies – ‘Click-Through Splash’, where the user is redirected to a captive portal and clicks on a link to be granted access to the Internet, and ‘Sign-on Splash’, where the user is redirected to a splash page and must either sign up or enter pre-defined user credentials to be granted access after validation against a user database (using RADIUS). A. EXCAP Overview - Click-Through Splash The Meraki Wi-Fi EXCAP architecture allows for a user to be re-directed to an external captive portal where the hotspot provider can show a custom web page, targeted advertising, etc. The user can then click on a link to be granted web access. The process is shown below, including the scripting theory behind the behavior as well as the steps to configure the Meraki cloud interface. Operator / Customer Network 2 Meraki Cloud Captive Portal Web Server 3 1 AP Client Device Figure 3. Click-Through EXCAP Architecture 6 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] The methodology by which a user is re-directed and ultimately granted access is as follows: PHP Scripting – Explanation and Theory 1 When a client connects to your network a web browser is opened with an HTTP-based request (ie. http://google.com). After you have successfully completed the steps described in the configuration section below, the AP in your network will intercept this request and redirect the user through the Meraki cloud platform to the custom URL you specified. The user should be directed to a URL similar to the following string: http://yourwebsite.com/clickthrough.php?base_grant_ url=https%00%00%00n00.meraki.com%2Fsplash%2Fgrant&user_continue_ url=http%3A%2F%2Fgoogle.com%2F&node_mac=00:18:0a:xx:xx:xx&client_ ip=10.128.128.120&client_mac=xx:xx:xx:xx:xx:xx You can use the node_mac, client_ip, and client_mac parameters to mine information about the user and hotspot usage. After you have correctly added the web server’s IP to the walled garden, the user will be viewing the splash page (note that if you wish to whitelist by domain name instead of a list of IPs, you can contact Meraki Support to enable this feature). Note the extra parameters appended to the URL. It is critical that your web server detects and makes use of these parameters, as they indicate how to grant access. You might choose to store these parameters in a session or otherwise save them for later use. At this point you can interact with the user however you wish. You might require them to agree to your terms of service, complete a form, or watch an advertisement. It is important to note that the user can fetch any web content within your walled garden. 2 Once you are prepared to grant access to the user, you must forward certain parameters you can gather from the URL in step 2 above. Specifically, you must forward the user to the following URL: GET[‘base_grant_url’] + “?continue_url=” + GET[‘user_continue_url’] Where the following parameters are extracted from the user’s original query or specified by you: base_grant_url = https://n##.meraki.com/splash/grant user_continue_url = http://google.com In the case of the example above the assembled URL would be: https://n##.meraki.com/splash/grant?continue_url=http://google.com Note: Your URL may be different than the above example. It is dynamic and you should therefore never hard-code the grant URL. 7 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] 3 The Meraki cloud platform grants access on the AP and redirects the user to continue to the URL (ie. http://www.google.com). Network operators can optionally specify the length of the session they are granting. To do so include an extra GET parameter with name “duration” For example: GET[‘base_grant_url’] + “?continue_url=” + GET[‘user_continue_url’] + “&duration=3600” (to grant access for one hour). You can obtain a pre-made sample PHP script at the following link: http://bit.ly/Mu9XRv. Configuration steps to set up click-through EXCAP on the Meraki dashboard are as follows: Access Control Configuration 1 Login to Dashboard and navigate to Configure -> “Access control.” 2 Select the SSID you want to configure from the SSID drop-down. 3 Under “Network access” -> “Association requirements,” choose “Open”, “WPA2,” or “WEP.” 4 Under “Network access” -> “Network sign-on method”, choose “Click-through splash page” 5 Enable walled garden (located under “Network access” -> “Walled garden”) and enter the IP address of your web server. 6 Click “Save Changes.” Enabling Custom Splash 8 1 Navigate to Configure -> Splash page 2 Select the SSID you want to configure from the SSID drop-down. 3 Under Custom splash URL select the radio button ‘Or provide a URL where users will be redirected’ (see Figure 3 below). 4 Type the URL of your custom splash page (ie. http://yourwebsite.com/yourphpscript.php). 5 Click “Save Changes”. Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] B. EXCAP Overview - Sign-on Splash The end-to-end flow with sign-on splash is similar to the use case with click-through splash, except there is an additional exchange between the Meraki cloud platform and a RADIUS server after a user submits their credentials on a splash page. This could be their existing login credentials from a supplementary service, or new credentials issued after they have made a payment. The process is shown below, including the scripting theory behind the behavior as well as the steps to configure the Meraki cloud interface. Operator / Customer Network 2 3 Meraki Cloud Captive Portal Web Server 5 1 4 Client Device AP AAA Figure 4. Sign-on EXCAP Architecture 9 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] The methodology by which a user is re-directed and ultimately granted access is as follows: Scripting – Explanation and Theory 1 When a client connects to your network a web browser is opened with an HTTP-based request (ie. http://google.com). Assuming you have successfully completed the steps described in the configuration section below, the AP in your network will intercept this request and redirect the user through the Meraki cloud platform to the custom URL you specified. The user should be directed to a URL similar to the following string: http://yourwebsite.com/clickthrough.php?continue_ url=http%3A%2F%2Fgoogle.com&login_url=https%3A%2F%2Fexample. meraki.com%2Fsplash%2Flogin%2F%3Fmauth%3DABCDEFG123456&ap_ mac=00:18:0a:00:01:02&ap_name=ap1&ap_tags=cafe You can use the ap_mac, ap_name, and ap_tags parameters to mine information about this hotspot’s usage. Assuming you have correctly added the web server’s IP to the walled garden, the user will be viewing the splash page. Note the extra parameters appended to the URL. It is critical that your web server detects and makes use of these parameters, as they indicate how to grant access. You might choose to store these parameters in a session or otherwise save them for later use. At this point you can interact with the user however you wish. You might require them to sign up for a billing plan, fill in their existing subscriber information, or force them to navigate within a walled garden only. It is important to note that the user can fetch any web content within your walled garden. 2 Once you are prepared to grant access to the user, the username and password must be sent via POST to the login_url. There are several ways of achieving this: 1. Provide the user with a form where they can enter their credentials and click submit. 2. Use javascript to trigger the form submit automatically on the users behalf. This allows the form to be prefilled and hidden from view. A sample web form is as follows: <html> <head><title>Internet Access Login</title></head> <body> <h2>Internet Access Login</h2> <form method=POST action=”https://example.meraki.com/splash/ login/?mauth=ABCDEFG123456”> <input type=”hidden” name=”success_url” value=”http://www. example.com/success/” /> Username: <input type =”text” name=”username” /> Password: <input type =”text” name=”password” /> <input type=”submit” value=”Login” /> </form> </body> </html> 10 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] 3 The Meraki cloud platform sends a RADIUS ACCESS-REQUEST to the customer’s RADIUS server. 4 The Meraki cloud platform receives an ACCESS-REJECT or ACCESS-ACCEPT response. The response may include one or more RADIUS parameters that Meraki supports, e.g., bandwidth limits and VLAN tags. If a valid response is received along with values for certain credentials, these will then be pushed to the AP which will in turn apply these values as settings to a client that is trying to connect. A complete list of RADIUS parameters that Meraki supports is included in Table 1. 5 When the user’s credentials are sent via POST and the user is redirected back to the success_url, we also append the logout_url to the success_url; this can be used to construct a window where a user can click to have their session terminated (e.g. to conserve remaining time in the case of billed access). For the example above, the user would be redirected to the following URL after successfully authenticating: http://www.example.com/success?logout_url=https%3A%2F%2Fexample.meraki. com%2Fsplash%2Flogout%2F%3Fmauth%3DABCDEFG123456 This success page is on your splash server, and the code on the success page can take this parameter and unescape it, which yields the following URL for logout: https://example.meraki.com/splash/logout/?mauth=ABCDEFG123456 11 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] Access Request Description User-Name User-Password Called-Station-ID (1) the MAC address of the Meraki access point and (2) the SSID on which the client is connecting. Example: “AA-BB-CCDD-EE-FF:SSID_NAME” Calling-Station-ID Contains the MAC address of the wireless device (all caps, octets separated by hyphens). Example: “AA-BB-CC-DD-EEFF”. Acct-Session-ID Unique session ID per login Framed-IP-Address NAS-Identifier NAS-Port-ID NAS-Port-Type Service-Type Access-Accept / Access-Reject Description Session-Timeout This is the maximum time in seconds that the given user’s session will last. After that time, the user will need to log in (authenticate) again using their username and password. Only used in Access-Accept packets. Idle-Timeout This is the idle timeout in seconds. If the user does not transfer any data on the network for this amount of time, the user’s session will end and they will need to log in (authenticate) again using their username and password. Only used in Access-Accept packets. This attribute is ignored if RADIUS accounting is not enabled on the network. Maximum-Data-Rate-Upstream/ Maximum-Data-Rate-Downstream These are used to impose bandwidth limits, only used in Access-Accept packets. The values are the maximum rate in bits/second. See RFC 4679: vendor-specific (set Vendor-Id 3561). If these values are not present, Dashboard will use the Bandwidth limits that the user set on the Dashboard configuration page as a default. Reply-Message This is a message for the user that will be displayed inline on the splash page. It is allowed in Access-Accept and AccessReject messages, but will only be shown to the user in the case of Access-Reject messages. Filter-ID This is a policy attribute that can be assigned to a user in order for them to adopt a corresponding Meraki ‘group policy’ configured in the Meraki Dashboard. A Meraki group policy can define a set of layer 3 and layer 7 firewall rules, in addition to a number of other traffic and QoS policies (e.g. blocking URL visibility). The Filter-ID attribute returned must match the group policy defined in the Dashboard in order for the user to adopt this policy. Table 1. RADIUS Parameters and Descriptions 12 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] Once the user has successfully authenticated using RADIUS, the Meraki cloud platform will send an Accounting Start message with certain parameters that the RADIUS server can use to track and gauge user behavior. Similarly, a RADIUS Accounting Stop message is sent when a user’s session is terminated, again filled with a list of statistics that a hotspot provider can use to form the basis for user analytics and policy decision making. A list of Accounting Start and Stop attributes are listed in Table 2. Accounting Start Description Acct-Delay-Time Acct-Session-ID Unique accounting ID meant to simplify matching of start and stop records in a log file. Acct-Status-Type Calling-Station-ID Contains the MAC address of the wireless device (all caps, octets separated by hyphens). Example: “AA-BB-CC-DD-EEFF”. Event-Timestamp Universal timestamp Framed-IP-Address NAS-Identifier Unique accounting ID meant to simplify matching of start and stop records in a log file. NAS-IP-Address NAS-Port Contains the MAC address of the wireless device (all caps, octets separated by hyphens). Example: “AA-BB-CC-DD-EEFF”. Accounting Stop Description Acct-Session-Time Acct-Input-Packets Unique accounting ID meant to simplify matching of start and stop records in a log file. Acct-Output-Packets Acct-Input-Octets Contains the MAC address of the wireless device (all caps, octets separated by hyphens). Example: “AA-BB-CC-DD-EEFF”. Acct-Output-Octets Universal timestamp Acct-Input-Gigawords Table 1. RADIUS Parameters and Descriptions 13 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] 4 Example Implementations A number of Meraki customers and partners have created advanced captive portal implementations that demonstrate the ease of integration with the Meraki EXCAP API. Examples include: A. Customers Forever New This popular fashion retailer uses Meraki for guest and corporate WiFi at several locations across Australia. They have integrated with EXCAP to build a custom splash page where they collect end-user e-mail addresses in exchange for complimentary access. Figure 5. Captive portal at fashion retailer Forever New 14 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] A&W Restaurants A&W uses Meraki to provide free wireless for guests at hundreds of locations across Canada. They have a custom-hosted splash page setup with their terms and conditions displayed for a customer to accept before gaining Internet access. Figure 4. Figure 6. Captive portal at A&W Restaurants 15 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] B. Service Providers Telmex Telmex integrated their own custom hosted splash pages with back-end subscriber databases so that when a user accesses one of their 10,000+ hotspots in Mexico, they can get free Wi-Fi access if they are an existing Telmex subscriber. The flow is that a user accesses Wi-Fi, sees the Telmex splash landing page, and enters their existing Telmex subscriber details. Telmex performs a look-up in their customer databases; they then grant free access if the person is an existing home broadband subscriber. If they aren’t, the user has the option to purchase a plan, at which point Telmex creates a new RADIUS record for the user. Figure 7. Captive portal at Telmex hotspots in Mexico Splash Access Splash Access, a UK-based Meraki partner used EXCAP to create a platform that retailers can use to build custom splash pages and then collect e-mail addresses and other customer info. If email addresses are collected, e-mail marketing campaigns can then be run using MailChimp. Wi-Tech Italian Meraki partner provides a managed service for public hotspot provision with a cloud hotspot management platform called Cloud4WiFi. EXCAP is used to allow for customizable splash pages. Wi-Tech offers a layer of customer engagement applications that can be overlaid on top of the splash pages, including geo-targeted ads using rotating banners, ‘spot news’ for the latest news stories, ‘whats around you’ for proximity-based recommendations on nearby points of interest such as bars and hotels, couponing, and the creation of online surveys. 16 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] C. Advanced EXCAP Use-Cases The Meraki EXCAP architecture can also be used in tandem with Meraki’s CMX API (described in the Meraki CMX Analytics whitepaper) in order to design a system where shopper’s identities are tied to their devices upon their first visit, facilitating real-time shopper engagement without a captive portal on subsequent visits. STEP 1: Tie identity to device using EXCAP STEP 2: Identify and engage device using CMX Analytics Figure 8. Shopper Engagement Flow 17 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected] 5 Conclusion Wi-Fi Internet access is increasingly being provided as an amenity to customers across a range of vertical markets. Examples include the provision of Wi-Fi hotspot access for guest access in enterprise, in retail outlets such as shopping complexes and cafes, and in hospitality environments such as hotels and resorts. As the expectation for ubiquitous Wi-Fi access becomes prevalent, Wi-Fi service providers are seeking ways in which they can leverage their hotspot infrastructure to provide unique services such as location-based advertising and customer loyalty programs. Captive portals can facilitate these types of applications by allowing the service provider to provide a customized ‘experience’ to the customer as a part of their Internet sign-on process. More information is available from Meraki’s knowledge base at https://meraki.cisco.com/support, and Meraki Support ([email protected]) can be contacted for more detailed information, use cases, and troubleshooting support. 18 Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected]